Displaying publications 81 - 100 of 543 in total

Abstract:
Sort:
  1. Al-Yateem N, Hijazi H, Saifan AR, Ahmad A, Masa'Deh R, Alrimawi I, et al.
    BMJ Open, 2023 Dec 22;13(12):e076326.
    PMID: 38135338 DOI: 10.1136/bmjopen-2023-076326
    OBJECTIVES: To identify language-related communication barriers that expatriate (non-Arabic) healthcare practitioners in the UAE encounter in their daily practice.

    DESIGN: Qualitative study utilising semi-structured in-depth interviews. The interviews were conducted in English language.

    SETTING: Different healthcare facilities across the UAE. These facilities were accessed for data collection over a period of 3 months from January 2023 to March 2023.

    PARTICIPANTS: 14 purposively selected healthcare practitioners.

    INTERVENTION: No specific intervention was implemented; this study primarily aimed at gaining insights through interviews.

    PRIMARY AND SECONDARY OUTCOMES: To understand the implications of language barriers on service quality, patient safety, and healthcare providers' well-being.

    RESULTS: Three main themes emerged from our analysis of participants' narratives: Feeling left alone, Trying to come closer to their patients and Feeling guilty, scared and dissatisfied.

    CONCLUSIONS: Based on the perspectives and experiences of participating healthcare professionals, language barriers have notably influenced the delivery of healthcare services, patient safety and the well-being of both patients and practitioners in the UAE. There is a pressing need, as highlighted by these professionals, for the inclusion of professional interpreters and the provision of training to healthcare providers to enhance effective collaboration with these interpreters.

    Matched MeSH terms: Communication; Communication Barriers
  2. Barlow M, Watson B, Jones E, Morse C, Maccallum F
    J Interprof Care, 2024 Jan 02;38(1):42-51.
    PMID: 37702325 DOI: 10.1080/13561820.2023.2249939
    Speaking up for patient safety is a well-documented, complex communication interaction, which is challenging both to teach and to implement into practice. In this study we used Communication Accommodation Theory to explore receivers' perceptions and their self-reported behaviors during an actual speaking up interaction in a health context. Intergroup dynamics were evident across interactions. Where seniority of the participants was salient, the within-profession interactions had more influence on the receiver's initial reactions and overall evaluation of the message, compared to the between profession interactions. Most of the seniority salient interactions occurred down the hierarchy, where a more senior professional ingroup member delivered the speaking up message to a more junior receiver. These senior speaker interactions elicited fear and impeded the receiver's voice. We found that nurses/midwives and allied health clinicians reported using different communication behaviors in speaking up interactions. We propose that the term "speaking up" be changed, to emphasize receivers' reactions when they are spoken up to, to help receivers engage in more mutually beneficial communication strategies.
    Matched MeSH terms: Communication*
  3. Al-Barazanchi I, Hashim W, Ahmed Alkahtani A, Rasheed Abdulshaheed H, Muwafaq Gheni H, Murthy A, et al.
    Comput Intell Neurosci, 2022;2022:9879259.
    PMID: 36156952 DOI: 10.1155/2022/9879259
    As of late 2019, the COVID19 pandemic has been causing huge concern around the world. Such a pandemic posed serious threats to public safety, the well-being of healthcare workers, and the overall health of the population. If automation can be implemented in healthcare systems, patients could be better cared for and health industries could be less burdened. To combat such challenges, e-health requires apps and intelligent systems. Using WBAN sensors and networks, a doctor or medical professional can advise patients on the best course of action. Patients' fitness could be assessed using WBAN sensors without interfering with their daily activities. When designing a monitoring system, system performance reliability for competent healthcare is critical. Existing research has failed to create a large device capable of handling a large network or to improve WBAN topologies for fast transmitting and receiving patient data. As a result, in this research, we create a multisensor WBAN (MSWBAN) intelligent system for transmitting and receiving critical patient data. To gather information from all cluster nodes and send it to multisensor WBAN, a novel additive distance-threshold routing protocol (ADTRP) is proposed. In small networks where data are managed by the transmitting node and the best data route is determined, this protocol has less redundancy. An edge-cutting-based routing optimization (ES-EC-R ES-EC-RO) is used to find the best route. The Trouped blowfish MD5 (TB-MD5) algorithm is used to encrypt and decrypt data, and the encrypted data are stored in a cloud database for security. The performance metrics of our proposed model are compared to current techniques for the best results. End-to-end latency is 63 ms, packet delivery is 95%, security is 95.7%, and throughput is 9120 bps, according to the results. The purpose of this article is to encourage engineers and front-line workers to develop digital health systems for tracking and controlling virus outbreaks.
    Matched MeSH terms: Computer Communication Networks*
  4. Hasan MZ, Hanapi ZM, Zukarnain ZA, Huyop FH, Abdullah MDH
    PLoS One, 2025;20(3):e0309532.
    PMID: 40096085 DOI: 10.1371/journal.pone.0309532
    In the realm of Wireless Sensor Networks (WSNs), the detection and mitigation of sinkhole attacks remain pivotal for ensuring network integrity and efficiency. This paper introduces SFlexCrypt, an innovative approach tailored to address these security challenges while optimizing energy consumption in WSNs. SFlexCrypt stands out by seamlessly integrating advanced machine learning algorithms to achieve high-precision detection and effective mitigation of sinkhole attacks. Employing a dataset from Contiki-Cooja, SFlexCrypt has been rigorously tested, demonstrating a detection accuracy of 100% and a mitigation rate of 97.31%. This remarkable performance not only bolsters network security but also significantly extends network longevity and reduces energy expenditure, crucial factors in the sustainability of WSNs. The study contributes substantially to the field of IoT security, offering a comprehensive and efficient framework for implementing Internet-based security strategies. The results affirm that SFlexCrypt is a robust solution, capable of enhancing the resilience of WSNs against sinkhole attacks while maintaining optimal energy efficiency.
    Matched MeSH terms: Computer Communication Networks*
  5. Grande SW, Epperly M, Tan KY, Yagnik S, Ellenbogen M, Pederson J, et al.
    Ann Fam Med, 2025 Mar 24;23(2):117-126.
    PMID: 40127970 DOI: 10.1370/afm.240165
    PURPOSE: We aimed to address fears and lived experiences of cognitive decline among adults via whole-person conversations that elicit problems and goals that matter most to patients. Currently, 6.7 million Americans have Alzheimer disease or related dementias, with an additional 28 million people reporting subjective cognitive decline-a possible indicator of Alzheimer disease and related dementias. A review of tools for older adults with cognitive impairment showed strong clinical specificity, with insufficient whole-person support for patients. We developed and tested the feasibility and acceptability of a tool to enhance conversations for adults with cognitive impairment at the point of care.

    METHODS: We conducted a feasibility study to build a conversation tool, guided by principles of shared decision making, called the "About Me" Care Card. Informed by an environmental scan, we created and pilot-tested prototypes at implementation sites. All phases were overseen by a multidisciplinary steering committee.

    RESULTS: Fourteen diverse clinicians consisting of 7 clinician types across 7 institutions piloted the card during in-person visits or by telephone. Observations showed that the card (1) allowed time to elicit what matters most to patients, (2) created space for personalized care conversations, (3) opened an examination of social care needs, and (4) moderated emotional relationships between families and individuals.

    CONCLUSION: A community-based codesign process led to a feasible tool for primary care teams to facilitate whole-person conversations with aging adults. The About Me Care Card appeared to broaden conversations compared with routine care. More work is needed to determine scalability and effects on outcomes.

    Matched MeSH terms: Communication*
  6. Shamim A, Balakrishnan V, Tahir M, Shiraz M
    ScientificWorldJournal, 2014;2014:340583.
    PMID: 25506612 DOI: 10.1155/2014/340583
    The increasing use and ubiquity of the Internet facilitate dissemination of word-of-mouth through blogs, online forums, newsgroups, and consumer's reviews. Online consumer's reviews present tremendous opportunities and challenges for consumers and marketers. One of the challenges is to develop interactive marketing practices for making connections with target consumers that capitalize consumer-to-consumer communications for generating product adoption. Opinion mining is employed in marketing to help consumers and enterprises in the analysis of online consumers' reviews by highlighting the strengths and weaknesses of the products. This paper describes an opinion mining system based on novel review and feature ranking methods to empower consumers and enterprises for identifying critical product features from enormous consumers' reviews. Consumers and business analysts are the main target group for the proposed system who want to explore consumers' feedback for determining purchase decisions and enterprise strategies. We evaluate the proposed system on real dataset. Results show that integration of review and feature-ranking methods improves the decision making processes significantly.
    Matched MeSH terms: Communication
  7. Kaiwartya O, Kumar S, Lobiyal DK, Abdullah AH, Hassan AN
    Sensors (Basel), 2014;14(12):22342-71.
    PMID: 25429415 DOI: 10.3390/s141222342
    Geographic routing is one of the most investigated themes by researchers for reliable and efficient dissemination of information in Vehicular Ad Hoc Networks (VANETs). Recently, different Geographic Distance Routing (GEDIR) protocols have been suggested in the literature. These protocols focus on reducing the forwarding region towards destination to select the Next Hop Vehicles (NHV). Most of these protocols suffer from the problem of elevated one-hop link disconnection, high end-to-end delay and low throughput even at normal vehicle speed in high vehicle density environment. This paper proposes a Geographic Distance Routing protocol based on Segment vehicle, Link quality and Degree of connectivity (SLD-GEDIR). The protocol selects a reliable NHV using the criteria segment vehicles, one-hop link quality and degree of connectivity. The proposed protocol has been simulated in NS-2 and its performance has been compared with the state-of-the-art protocols: P-GEDIR, J-GEDIR and V-GEDIR. The empirical results clearly reveal that SLD-GEDIR has lower link disconnection and end-to-end delay, and higher throughput as compared to the state-of-the-art protocols. It should be noted that the performance of the proposed protocol is preserved irrespective of vehicle density and speed.
    Matched MeSH terms: Computer Communication Networks
  8. Zubair S, Fisal N
    Sensors (Basel), 2014;14(5):8996-9026.
    PMID: 24854362 DOI: 10.3390/s140508996
    The need for implementing reliable data transfer in resource-constrained cognitive radio ad hoc networks is still an open issue in the research community. Although geographical forwarding schemes are characterized by their low overhead and efficiency in reliable data transfer in traditional wireless sensor network, this potential is still yet to be utilized for viable routing options in resource-constrained cognitive radio ad hoc networks in the presence of lossy links. In this paper, a novel geographical forwarding technique that does not restrict the choice of the next hop to the nodes in the selected route is presented. This is achieved by the creation of virtual clusters based on spectrum correlation from which the next hop choice is made based on link quality. The design maximizes the use of idle listening and receiver contention prioritization for energy efficiency, the avoidance of routing hot spots and stability. The validation result, which closely follows the simulation result, shows that the developed scheme can make more advancement to the sink as against the usual decisions of relevant ad hoc on-demand distance vector route select operations, while ensuring channel quality. Further simulation results have shown the enhanced reliability, lower latency and energy efficiency of the presented scheme.
    Matched MeSH terms: Computer Communication Networks
  9. Shakib MN, Moghavvemi M, Mahadi WN
    ScientificWorldJournal, 2014;2014:874241.
    PMID: 24723835 DOI: 10.1155/2014/874241
    A new compact planar notched ultrawideband (UWB) antenna is designed for wireless communication application. The proposed antenna has a compact size of 0.182λ × 0.228λ × 0.018λ where λ is the wavelength of the lowest operating frequency. The antenna is comprised of rectangular radiating patch, ground plane, and an arc-shaped strip in between radiating patch and feed line. By introducing a new Tuning Fork-shaped notch in the radiating plane, a stopband is obtained. The antenna is tested and measured. The measured result indicated that fabricated antenna has achieved a wide bandwidth of 4.33-13.8 GHz (at -10 dB return loss) with a rejection frequency band of 5.28-6.97 GHz (WiMAX, WLAN, and C-band). The effects of the parameters of the antenna are discussed. The experiment results demonstrate that the proposed antenna can well meet the requirement for the UWB communication in spite of its compactness and small size.
    Matched MeSH terms: Communication
  10. Shamsan Saleh AM, Ali BM, Rasid MF, Ismail A
    Sensors (Basel), 2012;12(8):11307-33.
    PMID: 23112658 DOI: 10.3390/s120811307
    Planning of energy-efficient protocols is critical for Wireless Sensor Networks (WSNs) because of the constraints on the sensor nodes' energy. The routing protocol should be able to provide uniform power dissipation during transmission to the sink node. In this paper, we present a self-optimization scheme for WSNs which is able to utilize and optimize the sensor nodes' resources, especially the batteries, to achieve balanced energy consumption across all sensor nodes. This method is based on the Ant Colony Optimization (ACO) metaheuristic which is adopted to enhance the paths with the best quality function. The assessment of this function depends on multi-criteria metrics such as the minimum residual battery power, hop count and average energy of both route and network. This method also distributes the traffic load of sensor nodes throughout the WSN leading to reduced energy usage, extended network life time and reduced packet loss. Simulation results show that our scheme performs much better than the Energy Efficient Ant-Based Routing (EEABR) in terms of energy consumption, balancing and efficiency.
    Matched MeSH terms: Computer Communication Networks
  11. Jayasinghe S
    Malays Fam Physician, 2008;3(1):34-6.
    PMID: 25606110
    The paper discusses the management of two individuals with asymptomatic hypertriglyceredemia, a common problem faces by Family Physicians in Malaysia. In such instances it is advisable to exclude an underlying disorder (e.g. metabolic syndrome) and take a pragmatic approach.
    Matched MeSH terms: Communication
  12. Liau QY, Leow CY, Ding Z
    Sensors (Basel), 2016 Jun 09;16(6).
    PMID: 27294924 DOI: 10.3390/s16060846
    Relaying is one of the useful techniques to enhance wireless physical-layer security. Existing literature shows that employing full-duplex relay instead of conventional half-duplex relay improves secrecy capacity and secrecy outage probability, but this is at the price of sophisticated implementation. As an alternative, two-path successive relaying has been proposed to emulate operation of full-duplex relay by scheduling a pair of half-duplex relays to assist the source transmission alternately. However, the performance of two-path successive relaying in secrecy communication remains unexplored. This paper proposes a secrecy two-path successive relaying protocol for a scenario with one source, one destination and two half-duplex relays. The relays operate alternately in a time division mode to forward messages continuously from source to destination in the presence of an eavesdropper. Analytical results reveal that the use of two half-duplex relays in the proposed scheme contributes towards a quadratically lower probability of interception compared to full-duplex relaying. Numerical simulations show that the proposed protocol achieves the ergodic achievable secrecy rate of full-duplex relaying while delivering the lowest probability of interception and secrecy outage probability compared to the existing half duplex relaying, full duplex relaying and full duplex jamming schemes.
    Matched MeSH terms: Communication
  13. Umar IA, Mohd Hanapi Z, Sali A, Zulkarnain ZA
    Sensors (Basel), 2016 Jun 22;16(6).
    PMID: 27338411 DOI: 10.3390/s16060943
    Resource bound security solutions have facilitated the mitigation of spatio-temporal attacks by altering protocol semantics to provide minimal security while maintaining an acceptable level of performance. The Dynamic Window Secured Implicit Geographic Forwarding (DWSIGF) routing protocol for Wireless Sensor Network (WSN) has been proposed to achieve a minimal selection of malicious nodes by introducing a dynamic collection window period to the protocol's semantics. However, its selection scheme suffers substantial packet losses due to the utilization of a single distance based parameter for node selection. In this paper, we propose a Fuzzy-based Geographic Forwarding protocol (FuGeF) to minimize packet loss, while maintaining performance. The FuGeF utilizes a new form of dynamism and introduces three selection parameters: remaining energy, connectivity cost, and progressive distance, as well as a Fuzzy Logic System (FLS) for node selection. These introduced mechanisms ensure the appropriate selection of a non-malicious node. Extensive simulation experiments have been conducted to evaluate the performance of the proposed FuGeF protocol as compared to DWSIGF variants. The simulation results show that the proposed FuGeF outperforms the two DWSIGF variants (DWSIGF-P and DWSIGF-R) in terms of packet delivery.
    Matched MeSH terms: Computer Communication Networks
  14. Zubair S, Syed Yusoff SK, Fisal N
    Sensors (Basel), 2016;16(2):172.
    PMID: 26840312 DOI: 10.3390/s16020172
    The emergence of the Internet of Things and the proliferation of mobile wireless devices has brought the area of mobile cognitive radio sensor networks (MCRSN) to the research spot light. Notwithstanding the potentials of CRSNs in terms of opportunistic channel usage for bursty traffic, the effect of the mobility of resource-constrained nodes to route stability, mobility-induced spatio-temporal spectral opportunities and primary user (PU) protection still remain open issues that need to be jointly addressed. To this effect, this paper proposes a mobile reliable geographical forwarding routing (MROR) protocol. MROR provides a robust mobile framework for geographical forwarding that is based on a mobility-induced channel availability model. It presents a comprehensive routing strategy that considers PU activity (to take care of routes that have to be built through PU coverage), PU signal protection (by the introduction of a mobility-induced guard (mguard) distance) and the random mobility-induced spatio-temporal spectrum opportunities (for enhancement of throughput). It also addresses the issue of frequent route maintenance that arises when speeds of the mobile nodes are considered as a routing metric. As a result, simulation has shown the ability of MROR to reduce the route failure rate by about 65% as against other schemes. In addition, further results show that MROR can improve both the throughput and goodput at the sink in an energy-efficient manner that is required in CRSNs as against compared works.
    Matched MeSH terms: Computer Communication Networks
  15. Samsuzzaman M, Islam MT
    Sensors (Basel), 2018 Dec 04;18(12).
    PMID: 30518080 DOI: 10.3390/s18124261
    A simple, compact sickle-shaped printed antenna with a slotted ground plane is designed and developed for broadband circularly polarized (CP) radiation. The sickle-shaped radiator with a tapered feed line and circular slotted square ground plane are utilized to realize the wideband CP radiation feature. With optimized dimensions of 0.29λ × 0.29λ × 0.012λ at 2.22 GHz frequency for the realized antenna parameters, the measured results display that the antenna has a 10 dB impedance bandwidth of 7.70 GHz (126.85%; 2.22⁻9.92 GHz) and a 3 dB axial ratio (AR) bandwidth of 2.64 GHz (73.33%; 2.28⁻4.92 GHz). The measurement agrees well with simulation, which proves an excellent circularly polarized property. For verification, the mechanism of band improvement and circular polarization are presented, and the parametric study is carried out. Since, the proposed antenna is a simple design structure with broad impedance and AR bandwidth, which is a desirable feature as a candidate for various wireless communication systems. Because of the easy printed structure and scaling the dimension with broadband CP characteristics, the realized antenna does incorporate in a number of CP wireless communication applications.
    Matched MeSH terms: Communication
  16. Mustaffa Samad
    Scientific Research Journal, 2006;3(1):27-36.
    MyJurnal
    The Internet has been an integral part of the Information and Communication
    Technology (ICT) community in recent years. New internet users have been
    growing steadily over the years. This has lead to the depletion of new Internet
    Protocol (IP) addresses worldwide. To overcome this predicament, the new
    Internet Protocol version 6 (IPv6) had been introduced. The existing Internet
    Protocol version 4 (IPv4) is expected to be eventually replaced by this IPv6.
    The changeover from IPv4 to IPv6 is expected to be implemented progressively.
    During this transition period, these two protocols are expected to coexist for
    a number of years. IPv4-to-IPv6 transition tools have been designed to facilitate
    a smooth transition from IPv4 to IPv6. The two most basic IPv4-to-IPv6
    transition tools available are the hybrid stack mechanism and tunneling.
    Tunneling is the encapsulation of IPv6 traffic within IPv4 packets so they can
    be sent over an IPv4 infrastructure. This project was initiated to set up an
    experimental IPv6 testbed, in order to study the performance as well as
    transition and migration issues of IPv6 networks under controlled conditions.
    This paper looks at how tunneling can be performed over existing internetwork
    infrastructure at Fakulti Kejuruteraan Elektrik (FKE), UiTM.
    Matched MeSH terms: Computer Communication Networks
  17. Nur Azien Yazid, Kamilah Abdullah, Suhaila Abd Halim
    ESTEEM Academic Journal, 2019;15(1):44-55.
    MyJurnal
    Image watermarking embeds identifying information in an image in such a manner that it cannot easily be removed. For the past several years, image digital watermarking has become a necessary element used for hiding secret image and enabling secured communication such as
    privacy, confidentiality, authentication and data integrity. Although numerous watermarking schemes are present in grayscale images, the present work focuses on the RGB color image. This study proposed a new hybrid method that would satisfy the essential needs of modern image watermarking. The color image watermarking is based on the 2D Discrete Cosine Transform and Elgamal cryptosystem. The 2D Discrete Cosine Transform depends on the matrix products, while the Elgamal cryptosystem depends on the discrete logarithm problem. The cryptosystem is combined with existing Arnold transform in watermarking algorithm to enhance the security of secret image. Value of Peak Signal to Noise Ratio was taken as performance evaluation parameters. On the whole, the performance evaluation shows that combining the two algorithms improved the performance of image watermarking.
    Matched MeSH terms: Communication
  18. Khalid H, Hashim SJ, Ahmad SMS, Hashim F, Chaudhary MA
    Sensors (Basel), 2021 Feb 18;21(4).
    PMID: 33670675 DOI: 10.3390/s21041428
    The development of the industrial Internet of Things (IIoT) promotes the integration of the cross-platform systems in fog computing, which enable users to obtain access to multiple application located in different geographical locations. Fog users at the network's edge communicate with many fog servers in different fogs and newly joined servers that they had never contacted before. This communication complexity brings enormous security challenges and potential vulnerability to malicious threats. The attacker may replace the edge device with a fake one and authenticate it as a legitimate device. Therefore, to prevent unauthorized users from accessing fog servers, we propose a new secure and lightweight multi-factor authentication scheme for cross-platform IoT systems (SELAMAT). The proposed scheme extends the Kerberos workflow and utilizes the AES-ECC algorithm for efficient encryption keys management and secure communication between the edge nodes and fog node servers to establish secure mutual authentication. The scheme was tested for its security analysis using the formal security verification under the widely accepted AVISPA tool. We proved our scheme using Burrows Abdi Needham's logic (BAN logic) to prove secure mutual authentication. The results show that the SELAMAT scheme provides better security, functionality, communication, and computation cost than the existing schemes.
    Matched MeSH terms: Communication
  19. Yee PL, Mehmood S, Almogren A, Ali I, Anisi MH
    PeerJ Comput Sci, 2020;6:e326.
    PMID: 33816976 DOI: 10.7717/peerj-cs.326
    Opportunistic routing is an emerging routing technology that was proposed to overcome the drawback of unreliable transmission, especially in Wireless Sensor Networks (WSNs). Over the years, many forwarder methods were proposed to improve the performance in opportunistic routing. However, based on existing works, the findings have shown that there is still room for improvement in this domain, especially in the aspects of latency, network lifetime, and packet delivery ratio. In this work, a new relay node selection method was proposed. The proposed method used the minimum or maximum range and optimum energy level to select the best relay node to forward packets to improve the performance in opportunistic routing. OMNeT++ and MiXiM framework were used to simulate and evaluate the proposed method. The simulation settings were adopted based on the benchmark scheme. The evaluation results showed that our proposed method outperforms in the aspect of latency, network lifetime, and packet delivery ratio as compared to the benchmark scheme.
    Matched MeSH terms: Computer Communication Networks
Filters
Contact Us

Please provide feedback to Administrator (afdal@afpm.org.my)

External Links